Prestige 334 User’s Guide

 

14.1.3.1 Encryption ...................................................................................

150

 

14.1.3.2 Data Confidentiality .....................................................................

151

 

14.1.3.3 Data Integrity ...............................................................................

151

 

14.1.3.4 Data Origin Authentication ..........................................................

151

14.1.4 VPN Applications ..................................................................................

151

14.2

IPSec Architecture .........................................................................................

151

14.2.1 IPSec Algorithms ..................................................................................

152

14.2.2 Key Management ..................................................................................

152

14.3

Encapsulation .................................................................................................

152

14.3.1 Transport Mode ....................................................................................

153

14.3.2 Tunnel Mode .........................................................................................

153

14.4

IPSec and NAT ...............................................................................................

153

Chapter 15

 

 

VPN Screens.......................................................................................................

156

15.1

VPN/IPSec Overview .....................................................................................

156

15.2

IPSec Algorithms ............................................................................................

156

15.2.1 AH (Authentication Header) Protocol ....................................................

156

15.2.2 ESP (Encapsulating Security Payload) Protocol ..................................

156

15.3

My IP Address ................................................................................................

157

15.4

Secure Gateway Address ..............................................................................

157

15.4.1 Dynamic Secure Gateway Address ......................................................

158

15.5

Summary Screen ...........................................................................................

158

15.6

Keep Alive ......................................................................................................

160

15.7

NAT Traversal ................................................................................................

160

15.7.1 NAT Traversal Configuration .................................................................

160

15.7.2 Remote DNS Server .............................................................................

161

15.8

ID Type and Content ......................................................................................

162

15.8.1 ID Type and Content Examples ............................................................

163

15.9

Pre-Shared Key ..............................................................................................

163

15.10 Editing VPN Rules ........................................................................................

164

15.11 IKE Phases ..................................................................................................

167

15.11.1 Negotiation Mode ................................................................................

168

15.11.2 Diffie-Hellman (DH) Key Groups .........................................................

168

15.11.3 Perfect Forward Secrecy (PFS) ..........................................................

168

15.12 Configuring Advanced IKE Settings .............................................................

169

15.13 Manual Key Setup ........................................................................................

174

15.13.1 Security Parameter Index (SPI) ..........................................................

175

15.14 Configuring Manual Key ...............................................................................

175

15.15 Viewing SA Monitor ......................................................................................

178

15.16 Configuring Global Setting ...........................................................................

179

15.17 Telecommuter VPN/IPSec Examples ...........................................................

180

15.17.1 Telecommuters Sharing One VPN Rule Example ..............................

180

13

Table of Contents